Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 3574 : Security and Cryptology

ISBN: 3540265473, 9783540265474

Size: 5 MB (5128933 bytes)

Pages: 594/597

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Bob Blakley, G. R. Blakley (auth.), Colin Boyd, Juan Manuel González Nieto (eds.)3540265473, 9783540265474

This book constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, held in Brisbane, Australia in July 2005.

The 45 revised full papers presented together with 3 invited papers were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on network security, cryptanalysis, group communication, elliptic curve cryptography, mobile security, side channel attacks, evaluation and biometrics, public key cryptosystems, access control, digital signatures, threshold cryptography, protocols, group signatures, credentials, and symmetric cryptography.


Table of contents :
Front Matter….Pages –
All Sail, No Anchor III: Risk Aggregation and Time’s Arrow….Pages 1-16
Traversing Middleboxes with the Host Identity Protocol….Pages 17-28
An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia….Pages 29-39
An Efficient Solution to the ARP Cache Poisoning Problem….Pages 40-51
On Stern’s Attack Against Secret Truncated Linear Congruential Generators….Pages 52-60
On the Success Probability of χ 2 -attack on RC6….Pages 61-74
Solving Systems of Differential Equations of Addition….Pages 75-88
A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead….Pages 89-100
Dynamic Group Key Agreement in Tree-Based Setting….Pages 101-112
Immediate Data Authentication for Multicast in Resource Constrained Network….Pages 113-121
Redundant Trinomials for Finite Fields of Characteristic 2….Pages 122-133
Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields….Pages 134-145
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two….Pages 146-157
Using “Fair Forfeit” to Prevent Truncation Attacks on Mobile Agents….Pages 158-169
An Improved Execution Integrity Solution for Mobile Agents….Pages 170-183
RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management….Pages 184-194
Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards….Pages 195-206
Improved Zero Value Attack on XTR….Pages 207-217
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks….Pages 218-229
SIFA: A Tool for Evaluation of High-Grade Security Devices….Pages 230-241
Cancelable Key-Based Fingerprint Templates….Pages 242-252
Hybrid Signcryption Schemes with Insider Security….Pages 253-266
On the Possibility of Constructing Meaningful Hash Collisions for Public Keys….Pages 267-279
Tunable Balancing of RSA….Pages 280-292
Key Management for Role Hierarchy in Distributed Systems….Pages 293-302
A Formalization of Distributed Authorization with Delegation….Pages 303-315
Two Improved Partially Blind Signature Schemes from Bilinear Pairings….Pages 316-328
On the Security of Nominative Signatures….Pages 329-335
Who Goes There? Internet Banking: A Matter of Risk and Reward….Pages 336-357
Role Activation Management in Role Based Access Control….Pages 358-369
VO-Sec: An Access Control Framework for Dynamic Virtual Organization….Pages 370-381
An Efficient Implementation of a Threshold RSA Signature Scheme….Pages 382-393
GBD Threshold Cryptography with an Application to RSA Key Recovery….Pages 394-405
An ( n – t )-out-of- n Threshold Ring Signature Scheme….Pages 406-416
Deposit-Case Attack Against Secure Roaming….Pages 417-428
Security Requirements for Key Establishment Proof Models: Revisiting Bellare–Rogaway and Jeong–Katz–Lee Protocols….Pages 429-442
Group Signature Schemes with Membership Revocation for Large Groups….Pages 443-454
An Efficient Group Signature Scheme from Bilinear Maps….Pages 455-467
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based….Pages 468-480
Analysis of the HIP Base Exchange Protocol….Pages 481-493
ID-based Authenticated Key Agreement for Low-Power Mobile Devices….Pages 494-505
On the Security of Two Key-Updating Signature Schemes….Pages 506-517
Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS….Pages 518-531
Potential Impacts of a Growing Gap Between Theory and Practice in Information Security….Pages 532-536
Security Analysis and Fix of an Anonymous Credential System….Pages 537-547
Counting Abuses Using Flexible Off-line Credentials….Pages 548-559
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity….Pages 560-571
New Cryptographic Applications of Boolean Function Equivalence Classes….Pages 572-583
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Information Security and Privacy: 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005. Proceedings”
Shopping Cart
Scroll to Top